[AISWorld] Contents of Volume 19, Issue 12 (December) Journal of the Association for Information Systems (JAIS)

JAIS JAIS at comm.virginia.edu
Sat Dec 29 00:03:56 EST 2018

Contents of Volume 19, Issue 12 (December) Journal of the Association for Information Systems (JAIS), Official Publication of the Association for Information Systems
Published: Monthly Electronically
ISSN: 1536-9323
Published by the Association for Information Systems, Atlanta, USA (http://aisel.aisnet.org/jais/)

Editor-in-Chief:  Professor Suprateek Sarker, University of Virginia, USA


Designing Social Nudges for Enterprise Recommendation Agents: An Investigation in the Business Intelligence Systems Context

Martin Kretzer, University of Mannheim
Alexander Maedche, Karlsruhe Institute of Technology (KIT)


According to behavioral economists, a “nudge” is an attempt to steer individuals toward making desirable choices without affecting their range of choices. We draw on this concept, and design and examine nudges that exploit social influence’s effects to control individuals’ choices. Although recommendation agent research provides numerous insights into extending information systems and assisting end consumers, it lacks insights into extending enterprise information systems to assist organizations’ internal employees. We address this gap by demonstrating how enterprise recommendation agents (ERAs) and social nudges can be used to tackle a common challenge that enterprise information systems face. That is, we use an ERA to facilitate information (i.e., reports) retrieval in a business intelligence system. In addition, we use social nudges to steer users toward reusing specific recommended reports rather than choosing between recommended reports randomly. To test the effects of the ERA and the four social nudges, we conduct a within-subject lab experiment using 187 participants. We also conduct gaze analysis (“eye tracking”) to examine the impact of participants’ elaboration. The results of our logistic mixed-effects model show that the ERA and the proposed social nudges steer individuals toward certain choices. Specifically, the ERA steers users toward reusing certain reports. These theoretical findings also have high practical relevance and applicability: In an enterprise setting, the ERA allows employees to reuse existing resources (such as existing reports) more effectively across their organizations because employees can more easily find the reports they actually need. This, in turn, prevents the development of duplicate reports.

To obtain a copy of the entire article, click on the link below:
Available at: http://aisel.aisnet.org/jais/vol19/iss12/4


A Tale of Two Deterrents: Considering the Role of Absolute and Restrictive Deterrence to Inspire New Directions in Behavioral and Organizational Security Research

Robert Willison, University of Jyväskylä
Paul Benjamin Lowry, Virginia Tech
Raymond Paternoster, University of Maryland


This research-perspective article reviews and contributes to the literature that explains how to deter internal computer abuse (ICA), which is criminal computer behavior committed by organizational insiders. ICA accounts for a large portion of insider trading, fraud, embezzlement, the selling of trade secrets, customer privacy violations, and other criminal behaviors, all of which are highly damaging to organizations. Although ICA represents a momentous threat for organizations, and despite numerous calls to examine this behavior, the academic response has thus far been lukewarm. However, a few security researchers have examined ICA’s influence in an organizational context and addressed potential means of deterring it. However, the results of these studies have been mixed, leading to a debate on the applicability of deterrence theory (DT) to ICA. We argue that more compelling opportunities will arise in DT research if security researchers more deeply study its assumptions and more carefully recontextualize it. The purpose of this article is to advance a deterrence research agenda that is grounded in the pivotal criminological deterrence literature. Drawing on the distinction between absolute and restrictive deterrence and aligning them with rational choice theory (RCT), this paper shows how deterrence can be used to mitigate the participation in and frequency of ICA. We thus propose that future research on the deterrent effects of ICA should be anchored in a more general RCT, rather than in examinations of deterrence as an isolated construct. We then explain how adopting RCT with DT opens up new avenues of research. Consequently, we propose three areas for future research, which cover not only the implications for the study of ICA deterrence, but also the potential motivations for these types of offenses and the skills required to undertake them.

To obtain a copy of the entire article, click on the link below:
Available at: http://aisel.aisnet.org/jais/vol19/iss12/3


“Computing” Requirements for Open Source Software: A Distributed Cognitive Approach

Xuan Xiao, Guangzhou University
Aron Lindberg, Stevens Institute of Technology
Sean Hansen, Rochester Institute of Technology
Kalle Lyytinen, Case Western Reserve University


Most requirements engineering (RE) research has been conducted in the context of structured and agile software development. Software, however, is increasingly developed in open source software (OSS) forms which have several unique characteristics. In this study, we approach OSS RE as a sociotechnical, distributed cognitive process where distributed actors “compute” requirements—i.e., transform requirements-related knowledge into forms that foster a shared understanding of what the software is going to do and how it can be implemented. Such computation takes place through social sharing of knowledge and the use of heterogeneous artifacts. To illustrate the value of this approach, we conduct a case study of a popular OSS project, Rubinius—a runtime environment for the Ruby programming language—and identify ways in which cognitive workload associated with RE becomes distributed socially, structurally, and temporally across actors and artifacts. We generalize our observations into an analytic framework of OSS RE, which delineates three stages of requirements computation: excavation, instantiation, and testing-in-the-wild. We show how the distributed, dynamic, and heterogeneous computational structure underlying OSS development builds an effective mechanism for managing requirements. Our study contributes to sorely needed theorizing of appropriate RE processes within highly distributed environments as it identifies and articulates several novel mechanisms that undergird cognitive processes associated with distributed forms of RE.

To obtain a copy of the entire article, click on the link below:
Available at: http://aisel.aisnet.org/jais/vol19/iss12/2


Data-Driven Meets Theory-Driven Research in the Era of Big Data: Opportunities and Challenges for Information Systems Research

Wolfgang Maass, Saarland University
Jeffrey Parsons, Memorial University of Newfoundland
Sandeep Purao, Bentley University
Veda C. Storey, Georgia State University
Carson Woo, University of British Columbia


The era of big data provides many opportunities for conducting impactful research from both data-driven and theory-driven perspectives. However, data-driven and theory-driven research have progressed somewhat independently. In this paper, we develop a framework that articulates important differences between these two perspectives and propose a role for information systems research at their intersection. The framework presents a set of pathways that combine the data-driven and theory-driven perspectives. From these pathways, we derive a set of challenges, and show how they can be addressed by research in information systems. By doing so, we identify an important role that information systems research can play in advancing both data-driven and theory-driven research in the era of big data.

To obtain a copy of the entire article, click on the link below:
Available at: http://aisel.aisnet.org/jais/vol19/iss12/1

Elizabeth White Baker, PhD
Production Managing Editor, Journal of the AIS
jais at comm.virginia.edu

More information about the AISWorld mailing list